Which of these devices can be connected using a straight-through cable Choose all that apply

Several users can't log in to the server. Which action would help you to narrow the problem down to the workstations, network, or server?

Check the server console for user connections.

A workstation on virtual local area network (VLAN) B needs to communicate with VLAN C. Which device is necessary to allow the communication?

Which of the following are IEEE versions of STP? (Choose all that apply.)

What happens if you connect a host to a switch and the switch port to which the host is connected is not configured to the correct VLAN membership for that user-for example, the Sales VLAN.?

The host cannot log into the services it needs, such as the Sales server or printe

What is the frequency range for the 802.11g standard?

Which of the following VPN protocols runs over port 1723, allows encryption to be done at the data level, and allows secure access?

What is the frequency range of the IEEE 802.11g standard?

A workstation gives an error message to a user stating that a duplicate Internet Protocol (IP) has been detected on the network. Using the standard troubleshooting model, what should be completed first?

You need to provide access to users in a small office. The users need to connect to the office servers from their cubicles and from the conference room. What device would be a good choice to install?

Host 1 sent a SYN packet to Host 2. What will Host 2 send in response

What does the T in the 100BaseT mean?

What routing protocol is typically used to connect ASs on the Internet?

What is the well-known port number for SMTP

If you have a device in a telecommunications closet owned and installed by the telecommunications company (telco) and it's your responsibility to cable from this box to the CPE, which term should you use to refer to the device?

You need to connect three access points running the 802.11b/g frequency range into the same office area. In which channel should you place these access points?

The three APs should be in different channels: 1, 6, and 11.

You lose power to your computer room and the switches in your network do not come back up when everything is brought online. After you have identified the affected areas, established the cause, and escalated this problem, what do you do next?

Meet with the emergency response team to determine the next step.

802.11g uses which modulation technique when running at 802.11b speeds?

When is STP said to be converged? (Choose all that apply.)

When all ports are in the blocking state
When all ports are in the forwarding state

Where does a frame have to carry a packet if it is destined for a remote network?

A server user calls and complains that she can't log in to the new Windows server by using the server name. You have her use the IP address of the server in the browser window from her host, and it connects. What can the problem possibly be?

Which WAN technology is a cell-switching technology?

How many hosts on a half-duplex segment can talk at one time

Which statements are false regarding ICMP packets? (Choose all that apply.)

ICMP guarantees datagram delivery ICMP is encapsulated within UDP datagrams

Which of the following devices can work at both Layers 2 and 3 of the OSI model?

Which of the following is a vendor-specific routing protocol?

You need to find a NIC's specific MAC address and IP address. Which command-line tool can you use to find this information without physically going to the computer?

A network technician recently installed wireless network cards for the company's mobile users. The help desk receives a call from one of its users who can no longer access the network with his laptop. The user walked upstairs to a supervisor's office with the laptop in hand. When the user returned to his office, the laptop was working fine again. What is the most likely cause of the problem

The user moved out of range of the access point.

To encode or read an encrypted message, what tool is necessary?

What is the minimum number of characters you should use when creating a secure password

You need a device that detects and reports attempts of unauthorized access to your network, identifies suspicious activity, and is best for identifying an attack. Which device should you install?

You have a host with a private IP address that needs to get onto the Internet. Your company uses NAT. Which term describes your host ID before translation?

Which of the following addresses is allowed onto the Internet

A user is complaining that it takes too long to access an application on a remote server. Which utility will identify the number of hops from the client to the server where the application resides

Which of the following are/is a connection-oriented protocol(s)? (Choose all that apply

File Transfer Protocol (FTP) BSecure File Transfer Protocol (SFTP) CHypertext Transfer Protocol (HTTP)

What do virtual LANs (VLANs) do?

Break up broadcast domains in a Layer 2 switched network

Which of the following is an example of a hybrid network?

Which device should be used if you need to send incoming packets to one or more machines that are hidden behind a single IP address?

Which utility can you use to find the MAC and TCP/IP addresses of your Windows workstation?

Users on your network are saturating your bandwidth because they are using too many non-work-related sites. What device would limit the availability of the types of sites that users on a LAN have access to while providing granular control over the traffic between the local LAN and the Internet?

What is the result of segmenting a network with a bridge (switch)? (Choose all that apply.)

It makes smaller collision domains. EIt increases the number of collision domains.

Which TCP/IP utility might produce the following output?

Pinging 204.153.163.2 with 32 bytes of data:

Reply from 204.153.163.2: bytes=32 time=1ms TTL=128
Reply from 204.153.163.2: bytes=32 time=1ms TTL=128
Reply from 204.153.163.2: bytes=32 time=1ms TTL=128
Reply from 204.153.163.2: bytes=32 time<10ms TTL=128

On an Ethernet switched network, what address does one host computer use to communicate with another?

In a Class C IP address, how long is the network address?

What tool would you use to both find a break in a fiber-optic connection and test the fiber connectivity on the network?

What layer in the IP stack is equivalent to the Transport layer of the OSI model?

You need to connect a UTP wire to a 110 block. Which of the following tools will you use?

What software searches network hosts for open ports?

Which of the following are categories of IGP protocols? (Choose all that apply.)

Distance vector CLink state

You want to continuously ping a host. Which of the following commands will do this?

Which type of communication has a line speed of 1.544 Mbps (millions of bits per second)?

user calls you, complaining that he can't access the corporate intranet web server. You try the same address, and you receive a Host Not Found error. Several minutes later, another user reports the same problem. You can still send email and transfer files to another server. What is the most likely cause of the problem?

A client boots up and needs IP information to communicate on the network, and the client does not have any static IP information. What address(es) will this host send out on the LAN as it looks for the information it needs to communicate? (Choose all that apply.)

FF:FF:FF:FF:FF:FF. 255.255.255.255

Port mirroring (also called port spanning) provides what service?

Allows you to view traffic from one or more ports

Which switch for the Windows nbtstat utility will display all NetBIOS name-resolution statistics?

Your boss wants Gigabit Ethernet in his office. It is all the way up the hall from the switch closet. You are concerned about distance. What is the maximum cable length in a 1000BaseT network

Microwave ovens and cordless phones interfere with which 802.11 frequency range?

You are on a Windows machine and want to know what the system name is. What command can you type at a command prompt to find out? (choose all that apply)

What WAN technology uses 30 64Kbps channels?

You need to perform maintenance on a router and need to temporarily reroute traffic through another office. Which would the best way to perform this action?

Which routing protocol has a maximum hop count of 15?

Where is the Hosts table located on a Windows machine?

At C:\Windows\System32\drivers\etc.

Which of the following are valid host IDs

You have installed a point-to-point connection using wireless bridges and Omni-directional antennas between two buildings. The throughput is low. What can you do to improve the link?        

Replace the Omni-directional antennas with Yagis.

Your DHCP server goes down and users are complaining that they cannot get to the Internet but can still see folder shares on each other's computers. How can this be?

Users didn't get an IP address from the DHCP server, but they automatically received an APIPA address so they can communicate locally by default

What is the default port number for HTTPS?

Which of the following routing protocols will send IPv6 route updates between routers?

What is a difference between a LAN and a WAN?

BAll of these are correct

Which tool is used to attach an RJ-45 connector to a Cat 5 cable?

MPLS works at what layer of the OSI model?

You need to check the path IP will use to forward a packet through a router. What should you look at?

You need to check the path IP will use to forward a packet through a router. What should you look at?

What is the subnetwork address for a host with the IP address 200.10.5.68/28?

: You need to make sure that the time is consistent across all your network devices. What protocol do you need to run on your network?

Fiber-optic cable is immune to electromagnetic interference (EMI) and radio frequency interference (RFI) because it ___________________ .

Transmits digital signals using light impulses

You can ping a server by its IP address but not by the FQDN. What can be the problem?

DNS is not resolving hostnames

Which coax cable is used for cable modems?

Which type of server in your network uses pointer and A records?

You have one IP address provided from your ISP with a /30 mask. However, you have 300 users that need to access the Internet. What technology will you use to implement a solution?

How is the decimal value 10 represented in binary?

Which WAN protocol utilizes cell-switching technology?

Which of the following uses pointer records and A records?

You connect a new host to your company's wireless network. The host is set to receive a DHCP address and the WEP key is entered correctly. However, the host cannot connect to the network. What can the problem be?

MAC filtering is enabled on the AP.

In a physical star topology, what happens when a workstation loses its physical connection to another device?

Only that workstation loses its ability to communicate

You add a new cable run to your network. What document should you update

Which of the following can check the speed and condition of the signal on a cable as well as measure the time it takes to send a signal down the wire and back?

You need to install wireless on multiple floors of a large building and maintenance area. What is your first concern before installing the APs

What VPN protocol uses port 1723

Which of the following is true when describing a multicast address?

Packets are delivered to all interfaces identified by the address. This is also called a one-to-many address

What OSI model layers do WAN protocols operate in?

Physical, Data Link, Network

Network Address Translation is placed on a router to translate IP addresses. Which of the following is the simplest description of an inside local address?

A private address before translation

A host automatically configured with an address from which of the following ranges indicates an inability to contact a DHCP server?

169.254.x.x with a mask of 255.255.0.0

When wireless users complain that they are losing their connection to applications during a session, what is the source if the problem?

Network Address Translation is placed on a router to translate IP addresses. Which of the following describes an inside global address?

A private address after translation

Monkey B, Michelangelo, Stoned, and Stealth Boot are examples of which type of virus?

What does the Base mean in 100BaseTX?

Which of the following is not a type of Network Address Translation (NAT)?

Which nbtstat switch displays a list of all the NetBIOS sessions currently active on the local workstation?

Which is true regarding dynamic routing?

Dynamic routes are automatically added to the routing table

What is the administrative distance of OSPF?

Using the following illustration, what would be the IP address of E0 if you were using the eighth subnet? The network ID is 192.168.10.0/28, and you need to use the last available IP address in the range. The 0 subnet should not be considered valid for this question.

Which of the following is a tunneling protocol

The network address of 172.16.0.0/19 provides how many subnets and hosts?

8 subnets, 8,190 hosts eac

You want to improve network performance by increasing the bandwidth available to hosts and limiting the size of the broadcast domains. Which of the following options will achieve this goal?

Switches configured with VLANs

Which of the following are not considered hybrid routing protocols? (Choose all that apply.)

What is the main difference between a worm and a virus?

Worms can replicate without user intervention.

technician has tested a cable and has established that it can successfully send and receive signals. Which of the following tools can be used to check the speed and condition of the signal?        

When would you configure VTP on a switch

When you have multiple switches with multiple VLANs and you want to share the VLAN database from one switch to all the others

Which is not a type of threat that can affect your network?

What command would be used to view the ARP cache on your host?

Which of the following describes dynamic routing?

Routing tables are updated automatically when changes occur in the network.

Which of the following uses a centralized authentication method?

You are troubleshooting and have established a theory of probable cause. What should you do now?

Test the theory to determine the cause

What is the purpose of the Frame Check Sequence (FCS) in an Ethernet frame?

At which layers of the OSI model do bridges, hubs, and routers primarily operate, respectively?

Data Link, Physical, Network

In what subnet is the host 192.168.10.12/29

What is the difference between static and dynamic routing

Dynamic routes are added automatically

What is the purpose of packet sniffers

Looking inside every packet on a network segment

What protocol from the Internet Protocol (IP) stack is used for diagnostics and error messages?

Which addresses are used to ping your local host for IPv4 and IPv6? (Choose all that apply.)

What does extended service set (ESS) ID mean

That you have more than one access point, and they are in the same SSID connected by a distribution system

What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter table?

With the exception of the source port, floods the network with the frame looking for the device

At which layer of the OSI model would you find IP?

Which of the following security mechanisms has been compromised?

A(n) _____________learns what is "normal" on the network and can react to abnormalities even if they're not part of the signature database.

Which of the following is a private IP address?

A remote user cannot connect to the central office with his VPN client; however, this user can get to the Internet. What is your first step to troubleshoot this problem?

Determine if the user has the correct VPN address and password

Which of the following is a valid Class B address

How many hosts per subnet does a subnet mask of 255.255.255.192 provide for?

Where is the IDS/IPS software typically placed within a network

Between the internal router and the firewall connected to the ISP

In general, firewalls work by ______________.

Allowing only packets that pass security restrictions to be forwarded

Why would you want to implement WPA? 

The values of WPA keys can change dynamically while the system is used.

new user has been added to the wireless network and all users except for the new user on the network can connect to the Internet. You add the WEP key and verify that the client has received a DHCP address. However, the laptop still cannot connect to the AP. What can the problem be

The AP is using MAC filtering

Which type of cable will have the pins in the same order on both connectors?

What switch would you use with the arp command to statically add an entry to the ARP cache?

What is one reason that WPA encryption is preferred over WEP?

The values of WPA keys can change dynamically while the system is used

1000BaseT is gigabit speeds. What is the minimum cable needed?

Which type of scanning allows an antivirus program to search for a virus even if there is no definition for it?

Which command would you use at a workstation prompt to see the DNS servers that are configured to use? (Choose all that apply

ifconfig Dipconfig Enslookup

Which of the following is a way that a server can distinguish among different simultaneous requests from the same host?

The requests have different port numbers

Which of the following uses only hop count as a metric to find the best path to a remote network?

Which of the following cannot be identified by NESSUS?

Which of the following devices operate at the Data Link layer of the Open Systems Interconnect (OSI) model? (Choose all that apply.)

Switch BAccess point (AP)

Your host needs to send a packet to a remote network. What is the destination address in the frame?

Which IPv6 routing protocol uses UDP port 521

Which is not a common term associated with modems?

You are using the route command on a Windows server to statically add a route. What is the command you need to use?

route add network mask next hop

What protocol helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium?

When are you most likely to see a Request Timed Out message?

When are you most likely to see a Request Timed Out message?

The purpose of the demarcation point is to separate the customer from whom?

Which of the following is a Layer 2 broadcast?

Which devices can be connected using a straight through cable?

A straight-through cable is used in local area networks to connect different devices like a computer to a network hub such as a router, router and switch, PC and switch, and so on. It is an alternative to wireless connections where one or more computers access a router through a wireless signal.

What is the example of straight through cable?

A straight-through cable is often called a wired patch cable or an Ethernet cable. The cable that comes in the box with your router is a straight through cable – it is the most common format for network cables.

Which of the following connections would you use a straight through cable for quizlet?

When would you use a straight-through cable and when would you use a crossover? A straight-through cable is used between a computer and a switch or hub and between a switch or hub and a router.

When would you use a straight through cable?

Straight through cables provide a connection that only allows one end to communicate at any given moment. These cables are the most common. They are best when connecting two different types of networking equipment. For instance, they are appropriate for connecting a computer to a switch, router or printer.